Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 May 2017 15:09:33 -0400
From:      Nikolai Lifanov <lifanov@FreeBSD.org>
To:        Alexey Dokuchaev <danfe@FreeBSD.org>, Konstantin Belousov <kib@FreeBSD.org>
Cc:        svn-src-head@freebsd.org, svn-src-all@freebsd.org, src-committers@freebsd.org
Subject:   Re: svn commit: r318313 - head/libexec/rtld-elf
Message-ID:  <6c327032-9eb5-2b0a-39ed-2140144a5a0d@FreeBSD.org>
In-Reply-To: <20170515185236.GB1637@FreeBSD.org>
References:  <201705151848.v4FImwMW070221@repo.freebsd.org> <20170515185236.GB1637@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--4jFhDCnXjCGIA4r2h2RwG5GItMfrDGXwK
Content-Type: multipart/mixed; boundary="cMpwKJqLw1EeQM8G9Ki0XhbWAxoJffejv";
 protected-headers="v1"
From: Nikolai Lifanov <lifanov@FreeBSD.org>
To: Alexey Dokuchaev <danfe@FreeBSD.org>,
 Konstantin Belousov <kib@FreeBSD.org>
Cc: svn-src-head@freebsd.org, svn-src-all@freebsd.org,
 src-committers@freebsd.org
Message-ID: <6c327032-9eb5-2b0a-39ed-2140144a5a0d@FreeBSD.org>
Subject: Re: svn commit: r318313 - head/libexec/rtld-elf
References: <201705151848.v4FImwMW070221@repo.freebsd.org>
 <20170515185236.GB1637@FreeBSD.org>
In-Reply-To: <20170515185236.GB1637@FreeBSD.org>

--cMpwKJqLw1EeQM8G9Ki0XhbWAxoJffejv
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

On 05/15/2017 14:52, Alexey Dokuchaev wrote:
> On Mon, May 15, 2017 at 06:48:58PM +0000, Konstantin Belousov wrote:
>> New Revision: 318313
>> URL: https://svnweb.freebsd.org/changeset/base/318313
>>
>> Log:
>>   Make ld-elf.so.1 directly executable.
>=20
> Does it mean that old Linux' trick of /lib/ld-linux.so.2 /bin/chmod +x
> /bin/chmod would now be possible on FreeBSD as well?  Does this have
> any security implications?
>=20
> ./danfe

This is a use case for fixing accidentally hosed /bin/chmod binary and
not some sort of an escalation thing. You will need to be root to do
this. Likewise, with working chmod binary, you should be able to mark
binaries with write access executable.

- Nikolai Lifanov


--cMpwKJqLw1EeQM8G9Ki0XhbWAxoJffejv--

--4jFhDCnXjCGIA4r2h2RwG5GItMfrDGXwK
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=Xg2P
-----END PGP SIGNATURE-----

--4jFhDCnXjCGIA4r2h2RwG5GItMfrDGXwK--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6c327032-9eb5-2b0a-39ed-2140144a5a0d>